recommended reading

Google Exec Named New Federal Chief Technology Officer

Flickr user Hubert Burda Media

Google executive Megan Smith will be the third person to hold the title of federal chief technology officer, the White House announced Thursday, and former Twitter attorney Alexander Macgillivray was named deputy CTO.

Smith most recently served as a vice president of Google X, the Internet giant’s forward-thinking research arm. She previously helped the company with new business, working on projects such as Google Earth and Google Maps.

“Megan has spent her career leading talented teams and taking cutting-edge technology and innovation initiatives from concept to design to deployment,” President Barack Obama said in a statement. “I am grateful for her commitment to serve, and I look forward to working with her and with our new deputy U.S. CTO, Alexander Macgillivray, in the weeks and months ahead.”

Before her stint at Google, Smith helped launch and then became CEO of PlanetOut, which operated several LGBT websites and later merged with Gay.com. She studied mechanical engineering at MIT.

Macgillivray, a “practicing” coder, according to the White House, served as Twitter’s general counsel from 2009 to 2013 earning a reputation as the site's "free speech defender." He earned his bachelor’s degree from Princeton University and a law degree from Harvard Law School School.

Both Smith and Macgillivray were considered potential replacements for Todd Park, who stepped down from the CTO post last week to take on a new Silicon Valley-based recruiting position.

Smith will be the first woman to hold the top technologist position.

Obama created the federal CTO position within the White House Office of Science and Technology Policy by an executive action on his first day in office. Despite the efforts of some lawmakers, the role is not statutorily required, and it's unclear what might happen to it under future administrations.

Obama named Aneesh Chopra to the post in May 2009. Chopra was succeeded in March 2012 by Park.

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.